Title | IoT network monitor |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Jonsdottir, G., Wood, D., Doshi, R. |
Conference Name | 2017 IEEE MIT Undergraduate Research Technology Conference (URTC) |
Keywords | Android (operating system), anomaly detection, Biomedical monitoring, Botnet, botnet traffic detection, character strings, computer network security, connected devices, consumer home IoT networks, deep packet analysis, default device passwords, default passwords, Entropy, home network security, home networks, Internet of Things, invasive software, IoT device, IoT network monitor, Mirai Botnet, Monitoring, network data analysis, password, Ports (Computers), privacy, pubcrawl, Raspberry Pi, Resiliency, router, Scalability, security, Security by Default, security vulnerability, sensitive personal information, telecommunication traffic, user interfaces, user-friendly interface |
Abstract | IoT Network Monitor is an intuitive and user-friendly interface for consumers to visualize vulnerabilities of IoT devices in their home. Running on a Raspberry Pi configured as a router, the IoT Network Monitor analyzes the traffic of connected devices in three ways. First, it detects devices with default passwords exploited by previous attacks such as the Mirai Botnet, changes default device passwords to randomly generated 12 character strings, and reports the new passwords to the user. Second, it conducts deep packet analysis on the network data from each device and notifies the user of potentially sensitive personal information that is being transmitted in cleartext. Lastly, it detects botnet traffic originating from an IoT device connected to the network and instructs the user to disconnect the device if it has been hacked. The user-friendly IoT Network Monitor will enable homeowners to maintain the security of their home network and better understand what actions are appropriate when a certain security vulnerability is detected. Wide adoption of this tool will make consumer home IoT networks more secure. |
DOI | 10.1109/URTC.2017.8284179 |
Citation Key | jonsdottir_iot_2017 |